Sciweavers

1106 search results - page 61 / 222
» Automated Design of Security Protocols
Sort
View
JCP
2006
120views more  JCP 2006»
13 years 10 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
CHI
2003
ACM
14 years 10 months ago
The impact of automated assistance on the information retrieval process
Advanced information retrieval systems providing automated assistance offer the opportunity to greatly enhance the effectiveness of the information retrieval process. One issue in...
Bernard J. Jansen, George K. Kroner
CCECE
2006
IEEE
14 years 4 months ago
A Hardware/Software Co-Design for RSVP-TE MPLS
This paper presents a hardware/software co-design for Multi Protocol Label Switching (MPLS) using RSVP-TE as a signaling protocol. MPLS is the protocol framework on which the atte...
Raymond Peterkin, Dan Ionescu
ICDCSW
2007
IEEE
14 years 4 months ago
Automated Ensemble Extraction and Analysis of Acoustic Data Streams
This paper addresses the design and use of distributed pipelines for automated processing of sensor data streams. In particular, we focus on the detection and extraction of meanin...
Eric P. Kasten, Philip K. McKinley, Stuart H. Gage
EUROCRYPT
2009
Springer
14 years 10 months ago
On the Portability of Generalized Schnorr Proofs
The notion of Zero Knowledge Proofs (of knowledge) [ZKP] is central to cryptography; it provides a set of security properties that proved indispensable in concrete protocol design...
Jan Camenisch, Aggelos Kiayias, Moti Yung